This article reminds me of the TEEP (Trusted Execution Environment Provisioning) protocol discussed at IETF now. The TEEP is a remote management protocol of Trusted Applications (TAs).
https://github.com/ietf-teep/teep-protocol
The launching mechanism is essential for TEEP. The comparison of launching mechanisms is interesting. I think some ideas are already implemented.
Mechanism 2a resembles the Secure Storage TA of OP-TEE.
https://optee.readthedocs.io/en/latest/architecture/trusted_applications.html#secure-storage-ta
Mechanism 3 resembles the Intel PCL (Protected Code Loader)
https://github.com/intel/linux-sgx/tree/master/SampleCode/SampleEnclavePCL
I want to evaluate the proposed mechanism with the existing mechanism.
Especially, the effects for Secure Monitor and runtime.
--
You received this message because you are subscribed to the Google Groups "Keystone Enclave Forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to keystone-enclave-...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/keystone-enclave-forum/505a22d5-e981-4785-a4ce-d9862bc28a45%40googlegroups.com.
Hello Dayeol and David,
I am not sure how to manage the decrypt key.
Mechanism1 and 2a seems that Runtime get a decrypt key for an encrypted binary, but Mechanism2b and 3 seems that Secure Monitor get a decrypt key.
I am not sure how to get the key.
Is the key common for a Secure Monitor or Runtime? Or is the key different for each device?
Which is the final key manager on each mechanism?
I think it affects the difficulty of SM modification.
Kuniyasu Suzaki
To unsubscribe from this group and stop receiving emails from it, send an email to keystone-enclave-forum+unsub...@googlegroups.com.